We are Persons and Citizens

Public and private actors are aligning largely into two camps in respect to the controversy generated after recent press and whistle-blower reports on mass surveillance and secret data mining. This alignment by no means is transparent, and many will be surprised to see that there are both liberal ("progressive") and conservative voices that don´t see "what the fuss is about." It is … Continue reading We are Persons and Citizens

Eclosion: The Future of Identity Management

As I mentioned in a previous post, I attended the 13th CISO Roundtable in Zeist on December 14th. The participants—all senior Security and Risk management leaders—engaged in a lively discussion. Floris van den Dool, the Accenture EALA Security Lead, managed to deliver yet another successful gathering focused on Security Management. The subject of the meeting, “The Future … Continue reading Eclosion: The Future of Identity Management

Thinking of the Future: Identity and Access Management

I spoke at 13th CISO Roundtable in Zeist, Netherlands on December 14th, 2010. This event had the participation of CISOs from Europe and the theme of the gathering was "The Future of Identity Management." How do you address such a challenging subject making sense of the fast changing landscape of Security and Identity and Access Management? I … Continue reading Thinking of the Future: Identity and Access Management

Required: Varieties of Identity to Deliver the Value of Cloud Computing

If you remain alert to the trends and changes of the information technology markets, there are moments when you feel that history repeats itself. This has been the case for the past 2-3 years with the raise of so-called Cloud Computing. It is evident that the combination of virtualisation, hosting, web services, new security protocols, … Continue reading Required: Varieties of Identity to Deliver the Value of Cloud Computing

I&AM: More than People, Process and Technology

In techno-centric environments it is not rare to find a strong emphasis on "people, process and technology". These are three aspects consistently covered by presentations, papers, books, proposals and reference materials. This kind of emphasis is shared by the major consulting firms and market research organisations like Gartner and Forrester. It is important to remark that this … Continue reading I&AM: More than People, Process and Technology

I&AM in the “Circle of Trust”

The I&AM Reference Architecture must be based on the idea of the "Circle of Trust". I take this notion from a paper published by John Arnold in 2006. In this context, "security" is interpreted as the definition, the establishment, the enforcement and the verification of trust. The I&AM domain is conceived in terms of "establishment … Continue reading I&AM in the “Circle of Trust”

I&AM beyond the “standard approach”

At the core of the I&AM domain we find the architectural principles of Identity Data Management and Identity Data Ownership.  Contrary to appearances and technological trends, I&AM is essentially data management and its correct understanding will lead to the application of both industry and enterprise standards in the sphere of information management. I&AM must be … Continue reading I&AM beyond the “standard approach”

I&AM and Organizational Transformation

Many times in my career I have been asked "What is Identity and Access Management and how does it work?" Even Security professionals feel unsure about the scope and nature of our discipline. Identity and Access Management --I always say-- is above everything else, a security discipline, but it would be a misunderstanding to interpret … Continue reading I&AM and Organizational Transformation